Journal articles on the topic 'BYOT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'BYOT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dhingra, Madhavi. "BYOD SECURITY AND ITS POSSIBLE SOLUTIONS." International Journal of Engineering Technologies and Management Research 5, no. 2 (April 27, 2020): 101–6. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.620.
Full textEarley, Seth, Robert Harmon, Maria R. Lee, and Sunil Mithas. "From BYOD to BYOA, Phishing, and Botnets." IT Professional 16, no. 5 (September 2014): 16–18. http://dx.doi.org/10.1109/mitp.2014.69.
Full textPrieto-González, Lisardo, Ricardo Colomo-Palacios, Beatriz Puerta, and Gerrit Tamm. "ModEAS." International Journal of Human Capital and Information Technology Professionals 5, no. 2 (April 2014): 52–61. http://dx.doi.org/10.4018/ijhcitp.2014040105.
Full textJunk, Günter, and Mathias Widler. "BYOD." Digitale Welt 2, no. 2 (March 7, 2018): 49–52. http://dx.doi.org/10.1007/s42354-018-0076-4.
Full textWalker-Osborn, C., S. Mann, and V. Mann. "to Byod or ... not to Byod." ITNOW 55, no. 1 (February 26, 2013): 38–39. http://dx.doi.org/10.1093/itnow/bws142.
Full textGaff, Brian M. "BYOD? OMG!" Computer 48, no. 2 (February 2015): 10–11. http://dx.doi.org/10.1109/mc.2015.34.
Full textBisson, Terry. "BYOB FAQ." Nature 449, no. 7163 (October 2007): 754. http://dx.doi.org/10.1038/449754a.
Full textChang, J. Morris, Pao-Chung Ho, and Teng-Chang Chang. "Securing BYOD." IT Professional 16, no. 5 (September 2014): 9–11. http://dx.doi.org/10.1109/mitp.2014.76.
Full textNeves, Ulysses Moreira, and Flávio Luis de Mello. "BYOD with Security." Journal of Information Security and Cryptography (Enigma) 5, no. 1 (January 27, 2019): 40. http://dx.doi.org/10.17648/jisc.v5i1.70.
Full textKöffer, Sebastian, Kevin Ortbach, Iris Junglas, Björn Niehaves, and Jeanne Harris. "Innovation Through BYOD?" Business & Information Systems Engineering 57, no. 6 (May 27, 2015): 363–75. http://dx.doi.org/10.1007/s12599-015-0387-z.
Full textBello, Abubakar Garba, David Murray, and Jocelyn Armarego. "A systematic approach to investigating how information security and privacy can be achieved in BYOD environments." Information & Computer Security 25, no. 4 (October 9, 2017): 475–92. http://dx.doi.org/10.1108/ics-03-2016-0025.
Full textVorakulpipat, Chalee, Soontorn Sirapaisan, Ekkachan Rattanalerdnusorn, and Visut Savangsuk. "A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/2057260.
Full textIdris, Moh. "PEMILIHAN SOLUSI PENERAPAN BRING YOUR OWN DEVICE (BYOD) BERDASARKAN KONTROL KEAMANANNYA." Jurnal Ilmiah Matrik 21, no. 3 (December 19, 2019): 214–22. http://dx.doi.org/10.33557/jurnalmatrik.v21i3.724.
Full textKabachinski, Jeff. "From COWs to BYOD." Biomedical Instrumentation & Technology 47, no. 3 (May 1, 2013): 254–58. http://dx.doi.org/10.2345/0899-8205-47.3.254.
Full textThomson, Gordon. "BYOD: enabling the chaos." Network Security 2012, no. 2 (February 2012): 5–8. http://dx.doi.org/10.1016/s1353-4858(12)70013-2.
Full textBeckett, Phil. "BYOD – popular and problematic." Network Security 2014, no. 9 (September 2014): 7–9. http://dx.doi.org/10.1016/s1353-4858(14)70090-x.
Full textShepherdson, Mark. "BYOD – the biometric implications." Biometric Technology Today 2013, no. 4 (April 2013): 5–7. http://dx.doi.org/10.1016/s0969-4765(13)70074-2.
Full textRoberti, M. Julia, Luciana Giordano, Thomas M. Jovin, and Elizabeth A. Jares‐Erijman. "FRET Imaging bykt/kf." ChemPhysChem 12, no. 3 (January 27, 2011): 563–66. http://dx.doi.org/10.1002/cphc.201000925.
Full textJunk, Günter. "BYOD im öffentlichen Sektor." Innovative Verwaltung 39, no. 10 (October 2017): 38–40. http://dx.doi.org/10.1007/s35114-017-0121-4.
Full textModrow, Eckart. "Objektorientiertes Programmieren mit BYOB." LOG IN 31, no. 4 (July 2012): 62–70. http://dx.doi.org/10.1007/bf03323760.
Full textOphoff, Jacques, and Steve Miller. "Business Priorities Driving BYOD Adoption: A Case Study of a South African Financial Services Organization." Issues in Informing Science and Information Technology 16 (2019): 165–96. http://dx.doi.org/10.28945/4303.
Full textMoreira, Ailton, Carlos Filipe da Silva Portela, and Manuel Filipe Santos. "Bring Your Own Device in Healthcare." International Journal of Privacy and Health Information Management 7, no. 2 (July 2019): 1–13. http://dx.doi.org/10.4018/ijphim.2019070101.
Full textOfusori, Lizzy Oluwatoyin, and Prabhakar Rontala Subramaniam. "The Influence of Technical and Social Factors in Mitigating Threats in a BYOD-Enabled Environment." International Journal of Information Systems in the Service Sector 13, no. 1 (January 2021): 1–30. http://dx.doi.org/10.4018/ijisss.2021010101.
Full textYusri Jusoh, Mohd, Haryani Haron, and Jasber Kaur. "The Transformation of Byod Practices to Support Green Computing in Malaysia Public Sector." International Journal of Engineering & Technology 7, no. 3.20 (September 1, 2018): 361. http://dx.doi.org/10.14419/ijet.v7i3.20.19273.
Full textZhang, Lixuan Zhang, Matthew Mouritsen, and Jeffrey R. Miller. "Role of Perceived Value in Acceptance of “Bring Your Own Device” Policy." Journal of Organizational and End User Computing 31, no. 2 (April 2019): 65–82. http://dx.doi.org/10.4018/joeuc.2019040104.
Full textJusoh, Mohd Yusri, Haryani Haron, and Jasber Kaur. "Work Process of Bring Your Own Device to Support Green Computing." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 1 (July 1, 2018): 137. http://dx.doi.org/10.11591/ijeecs.v11.i1.pp137-143.
Full textYuan, Yi Fei, Lian Zhong Liu, and Chun Yan Han. "A Security Compliance Based Mobile User Authentication Scheme." Advanced Materials Research 989-994 (July 2014): 4514–18. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4514.
Full textWani, Tafheem Ahmad, Antonette Mendoza, and Kathleen Gray. "Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature." JMIR mHealth and uHealth 8, no. 6 (June 18, 2020): e18175. http://dx.doi.org/10.2196/18175.
Full textHuang, Chong Qing, X. A. Mei, M. Chen, and J. Liu. "Ferroelectric Properties of Bi4-xYbxTi3O12 Thin Films." Key Engineering Materials 591 (November 2013): 216–19. http://dx.doi.org/10.4028/www.scientific.net/kem.591.216.
Full textSmith, William P. "“Can we borrow your phone? Employee privacy in the BYOD era”." Journal of Information, Communication and Ethics in Society 15, no. 4 (November 13, 2017): 397–411. http://dx.doi.org/10.1108/jices-09-2015-0027.
Full textCristol, Dean, and Belinda Gimbert. "Academic Achievement in BYOD Classrooms." QScience Proceedings 2013, no. 3 (October 7, 2013): 15. http://dx.doi.org/10.5339/qproc.2013.mlearn.15.
Full textIskierka, Sławomir, Janusz Krzemiński, and Zbigniew Weżgowiec. "Technologia BYOD w polskich szkołach." Dydaktyka Informatyki 10, no. 1 (2015): 80–89. http://dx.doi.org/10.15584/di.2015.10.9.
Full textPodgórski, Grzegorz. "Bezpieczeństwo informacji w modelu BYOD." Nierówności społeczne a wzrost gospodarczy 53, no. 1 (2018): 180–92. http://dx.doi.org/10.15584/nsawg.2018.1.15.
Full textAlbova, A. "NEW SAFETY IN BYOD STYLE." LastMile 68, no. 7 (2017): 42–46. http://dx.doi.org/10.22184/2070-8963.2017.68.7.42.46.
Full textTokuyoshi, Brian. "The security implications of BYOD." Network Security 2013, no. 4 (April 2013): 12–13. http://dx.doi.org/10.1016/s1353-4858(13)70050-3.
Full textDisterer, Georg, and Carsten Kleiner. "BYOD Bring Your Own Device." Procedia Technology 9 (2013): 43–53. http://dx.doi.org/10.1016/j.protcy.2013.12.005.
Full textVignesh, U., and S. Asha. "Modifying Security Policies Towards BYOD." Procedia Computer Science 50 (2015): 511–16. http://dx.doi.org/10.1016/j.procs.2015.04.023.
Full textDeba, Suman, Himanshu Singh, Behara Lakshmi Rohini, Dheeraj Mishra, Rohit Kumar Meena, and Paritosh Bhattacharya. "BYOD Supported Crowd Interaction System." Procedia Computer Science 132 (2018): 1586–91. http://dx.doi.org/10.1016/j.procs.2018.05.123.
Full textSaha, Subham, and Suman Deb. "BYOD Supported Multimodal Classroom Interaction." Procedia Computer Science 167 (2020): 1533–42. http://dx.doi.org/10.1016/j.procs.2020.03.364.
Full textRomer, Hormazd. "Best practices for BYOD security." Computer Fraud & Security 2014, no. 1 (January 2014): 13–15. http://dx.doi.org/10.1016/s1361-3723(14)70007-7.
Full textHudson, Suzanne. "BYOC (Bring-Your-Own-Craft)." Journal of Modern Craft 13, no. 3 (September 1, 2020): 365–68. http://dx.doi.org/10.1080/17496772.2020.1843791.
Full textDisterer, Georg, and Carsten Kleiner. "Using Mobile Devices with BYOD." International Journal of Web Portals 5, no. 4 (October 2013): 33–45. http://dx.doi.org/10.4018/ijwp.2013100103.
Full textMiller, Keith W., Jeffrey Voas, and George F. Hurlburt. "BYOD: Security and Privacy Considerations." IT Professional 14, no. 5 (September 2012): 53–55. http://dx.doi.org/10.1109/mitp.2012.93.
Full textDisterer, Georg, and Carsten Kleiner. "BYOD — Bring Your Own Device." HMD Praxis der Wirtschaftsinformatik 50, no. 2 (April 2013): 92–100. http://dx.doi.org/10.1007/bf03340800.
Full textParham, Abbie Gail, J. Lowell Mooney, and Timothy D. Cairney. "When BYOD Meets Big Data." Journal of Corporate Accounting & Finance 26, no. 5 (June 13, 2015): 21–27. http://dx.doi.org/10.1002/jcaf.22059.
Full textAli, Md Iman, and Sukhkirandeep Kaur. "Next-Generation Digital Forensic Readiness BYOD Framework." Security and Communication Networks 2021 (March 20, 2021): 1–19. http://dx.doi.org/10.1155/2021/6664426.
Full textDoargajudhur, Melina Seedoyal, and Peter Dell. "Impact of BYOD on organizational commitment: an empirical investigation." Information Technology & People 32, no. 2 (April 1, 2019): 246–68. http://dx.doi.org/10.1108/itp-11-2017-0378.
Full textБАЖМІНА, Евеліна. "ВИКОРИСТАННЯ BYOD ТЕХНОЛОГІЙ В ОСВІТНЬОМУ ПРОЦЕСІ." Scientific papers of Berdiansk State Pedagogical University Series Pedagogical sciences 3 (December 2020): 27–40. http://dx.doi.org/10.31494/2412-9208-2020-1-3-27-40.
Full textBaillette, Paméla, and Yves Barlette. "BYOD-related innovations and organizational change for entrepreneurs and their employees in SMEs." Journal of Organizational Change Management 31, no. 4 (July 2, 2018): 839–51. http://dx.doi.org/10.1108/jocm-03-2017-0044.
Full textStąpór, Paweł, and Dariusz Laskowski. "Bring Your Own Device - Providing Reliable Model of Data Access." Journal of KONBiN 39, no. 1 (October 1, 2016): 41–56. http://dx.doi.org/10.1515/jok-2016-0031.
Full text